Source: securityaffairs.co

A flaw in Alpine Linux could allow executing arbitrary code - Cyber security news

A flaw in Alpine Linux could allow executing arbitrary code

Researcher devised a new CSS & HTML attack that causes iPhone reboot or freezes Macs - Cyber security news

Researcher devised a new CSS & HTML attack that causes iPhone reboot or freezes Macs

EOSBet Gambling application hacked, crooks stole $200,000 worth of EOS - Cyber security news

EOSBet Gambling application hacked, crooks stole $200,000 worth of EOS

The main source of infection on ICS systems was the internet in H1 2018 - Cyber security news

The main source of infection on ICS systems was the internet in H1 2018

Domestic Kitten – An Iranian surveillance operation under the radar since 2016 - Cyber security news

Domestic Kitten – An Iranian surveillance operation under the radar since 2016

Google paid million dollars to track offline purchases using Mastercard Data - Cyber security news

Google paid million dollars to track offline purchases using Mastercard Data

Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed - Cyber security news

Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed

Compromising Proxy Call Session Control Function (P-CSCF) using VoLTE - Cyber security news

Compromising Proxy Call Session Control Function (P-CSCF) using VoLTE

TrendMicro links Urpage hacking crew to other threat actors - Cyber security news

TrendMicro links Urpage hacking crew to other threat actors

Experts published a PoC code for Intel Management Engine JTAG flaw - Cyber security news

Experts published a PoC code for Intel Management Engine JTAG flaw

Apple zero-day exposes macOS to Synthetic Mouse-Click attacks - Cyber security news

Apple zero-day exposes macOS to Synthetic Mouse-Click attacks

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet - Cyber security news

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Tech Support Scams improved with adoption of Call Optimization Service - Cyber security news

Tech Support Scams improved with adoption of Call Optimization Service

Analyzing the Telegram-based Android remote access trojan HeroRAT - Cyber security news

Analyzing the Telegram-based Android remote access trojan HeroRAT

Underminer Exploit Kit spreading Bootkits and cryptocurrency miners - Cyber security news

Underminer Exploit Kit spreading Bootkits and cryptocurrency miners

APT-C-27 ’s long-term espionage campaign in Syria is still ongoing - Cyber security news

APT-C-27 ’s long-term espionage campaign in Syria is still ongoing